The course teaches the fundamental principles of computer and
communication networking. A mix of fundamental concepts and recent
technologies helps the students to (1) learn protocol design
principles, performance considerations, and networking technologies;
(2) become familiar with the design issues and tradeoffs that arise in
building and using real-world networks; and (3) gain hands-on
experience through a semester-long programming project. After this
course students should have general knowledge on how the Internet
works and what issues are encountered in the integration of voice,
video, and data services.

All exams are open book, meaning that the students can have
access to the textbook or any other paper-based materials.
No cell phone, laptops, or other networked devices are allowed at the exams for two reasons:

to avoid student collaboration during the exam

to deny unfair advantage for students using a digital textbook to do quick searches for the exam topics.

Please do not inquire about exceptions, because none will be allowed.No discussion is allowed among the students
during the exam. Such students shall be asked to leave the
classroom.
Please remember to bring your own calculator to the exam.

All assignments should be prepared using a word processor.
Handwritten assignments orthose containing handwritten material
(e.g., figures, tables, etc.) will not be accepted.

Requests for grade review will be considered no later than
four weeks after notification of the grade.

NOTE: There will be no make-up for any of
the exams. Please don't bother asking.

Collaboration / Academic Integrity:

It is acceptable to discuss with others possible general
approaches to problems. It is not
acceptable to work together on a detailed solution, to copy a
solution, or to give away a solution. Such instances of academic
dishonesty will result in the following.

We will not consider unspecific and general complaints
about copying of homework or exam solutions. The students are mature
adults and should refrain from engaging in such dishonest
activity.
We cannot just "do something." To take action, we need specific
information: who did what.

In cases where we have reasonable evidence to suspect that
students worked together on a detailed solution or
copied a solution, the following shall apply:

If we are not able to distinguish the original solution
and the copy, all the suspect students will be given zero (0) credit.

If we are able to distinguish the original solution and
the copy, the student with the original solution will be
given zero (0) credit, and the copier shall not be
penalized. This is designed so to discourage students from giving
away their solution.

If a student claims not to have originated the solution
but copied one and provides the name of the student from
whom the solution was copied, the student with the original
solution will be given zero credit, and the copier will be given
the full credit (as graded).

We'd be very happy to receive suggestions on how to improve the quality
of the course and fairness of the grading process. Email us your
suggestions and concerns.
To submit your feedback anonymously you may consider
RateMyProfessor.com.